You are on page 1of 9

1.

When a client DHCP issued address expires, the client will:


Attempt to obtain a new address by broadcasting

Require manual configuration with a static IP address

Continue to use the address until it is notified to stop

Select a new address and request approval from the DHCP server

2. For each of the following statements, select YES if the statement is true. Otherwise, select NO.
Each correct selection is worth one point
Ѻ YES/NO 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A is a valid IPv6 unicast address
Ѻ YES/NO FE80::2AA:FFFE28:9C5A is a valid IPv6 Address
Ѻ YES/NO 21DA::02AA:::FF:FE28:9C5A is a valid IPv6 Address

3. You receive a call from a family member who is unable to correct to a game server. You learn
that the server’s IP is 172.16.2.11.
To help, you ping the server and receive the information shown in the following image:

Use the drop down menus to complete each statement. Each correct selection is worth one point

 The server ……………………. Your ping requests did not return


 The server status is ……………………… unknown

4. Match the OSI layer to its corresponding description


To answer, drag the appropriate OSI layer from the column on the left to its description on right. Each OSI
layer may be used once, more than once, or not at all. Each correct match is worth one point.
Data Link It provides network services directly to the user’s
Application Application. TELNET, SMTP and NTP operate on this
Network layer

Session It control dialogue between source and destination


Session
Nodes. RPC and NETBIOS operate on this layer
Application
It relies on upper layers for reliable delivery and
Network
Sequencing. IPX and X.25 and NLSP operate on this layer

It ensures that reassembled bits are in the correct Order


Data Link and it request retransmission of frames if an error
occurs. Switches and WAPs operate on this layer

It is responsible for path determination and delivery of


Network packets, but does not guarantee delivery delivery ICMP.
RIP and ARP operate on this layer

Data Link It checks for errors by adding CRC to the frame. Bridges
and NIC’s operate on this layer

5. Match the IPv4 address type to the corresponding definition


To answers, drag the appropriate definition from the column on the left to the address type on the right.
Each definition may be used more than once, or not all. Each correct match is worth one point
Assigned to a single network interface Multicast
located on a specific subnet on the assigned to a single
network and used for one-to-one
communications

Assigned to the variable portion of an Broadcast


IPv4 address that is used to identify a assigned to all
network node’s interface on a subnet

Assigned to one or more network Unicast


interfaces located on various subnets assigned to one
on the network and used for one to
many communications

Assigned to all network interfaces


located on a subnet on the network
and used for one to everyone on a
subnet communications

6. Match each address type to its appropriate range


To answer, drag the appropriate address type from the column on the left to its range on the right. Each
address type may be used more than once, or not at all. Each correct match is worth one point.

Loopback address loopback Address 127.0.0.0 – 127.255.255.255

Multicast address private Network Address 192.168.0.0 – 192.168.255.255

Private network address Multicast Address 224.0.0.0 – 239.255.255.255


7. For each of the following statements, select YES if the statement is true. Otherwise, select NO.
Each correct selection is worth one point
Ѻ YES/NO With a recursive DNS query, the DNS server will contact any other DNS servers if knows about
to resolve the request
Ѻ YES/NO When an iterative query cannot be resolved from local data, such as local zone files or a cache
of previous queries, the query needs to be escalated to a root DNC server
Ѻ YES/NO A DNS server makes an iterative query as it tries to find names outside of its local domain
when it is not configured with a forwarder

8. Match each IP address to its corresponding IPv4 Address Class


To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the
right. Each IP address class may be used more than once, or not at all. Each correct match is worth one
point.

133.234.23.2 64.123.12.1 Class A

224.100.20.3 133.234.23.2 Class B

201.111.22.3 201.11.22.3 Class C

64.123.12.1 224.100.22.3 Class D

9. This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.

Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct

WPA - AES

WPA2

WPA - PSK

No change is needed

10. If a router cannot determine the next hop for a packet, the router will:
Send the packet back to the packet’s source

Forward the packet to the default route True

Broadcast the packet

Store the packet in the memory buffer


11. Identify the network cable type and connector in the following graphic

optic fiber rj 11

12. What is an example of a network device that associates a network address with a port?
DSL modem

Hub

Router

Switch

13. One advantage of dynamic routing is that it:


Limits traffic derived from routing protocols

Automatically maintains routing tables

Automatically enable DHCP

Reduces broadcast traffic

14. You are home for vacation, and a family member wants your help to purchase and install
network cable for a home office. The cable needs to support at least 300 Mbps.
What is the least expensive option that meets this requirement?

Cat3

Cat5

Cat5e

Cat6
15. A cable that meets the 100BaseT standard has a maximum length of:
100 m

250 m

500 m

1000 m

16. This question requires that you evaluate the underlined text to determine if it is correct.
Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet
and for local address

Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct

HTTP

FTP

SNMP

No Change is needed

17. This question requires that you evaluate the underlined text to determine if it is correct.
Plain Old Telephone Service (POTS), most ISDN lines and Switched T1 lines are all examples of Message
Switching.

Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct

Circuit Switching

Packet Switching

FDDI Switching

No Change is needed

18. What are two advantage of using star topology rather than ring topology in a computer lab
workgroup? (Choose two.)
Failure of a central connectivity device does not bring down the entire network

A cable problem within the group affects two nodes, at most


Data travels on redundant paths, so one cable cannot stop its transmission

A central connection point allows for flexibility and scalability

19. You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for
three new PCs so that they connect to two web servers.
The servers connect to the three new PCs as shown in the following image:

 The Security setting for http://hr.contoso.com trusted sites


 The Security setting for http://sales.northwindtraders.com trusted sites

20. For each of the following statements, select YES if the statement is true. Otherwise, select NO.
Each correct selection is worth one point
Ѻ YES/NO You use a perimeter network to grant internal client access to external resources
Ѻ YES/NO A LAN has no access to the perimeter network
Ѻ YES/NO A perimeter network typically contains servers that require Internet access. Such as web or
email address

21. Which wireless communication problem is caused by electromagnetic waves?


Fading

Attenuation

Interference
Diffraction

22. In a physical star topology, the central device is referred to as a:


Bridge

Server

Hub

Segmented

23. Your home computer is having problem accessing the Internet.


You suspect that your Internet router’s DHCP service is not functioning, so you check your computer’s IP
address.

Which address indicates that your router’s DHCP service is NOT functioning?

10.19.1.15

169.254.1.15

172.16.1.15

192.168.1.15

24. Which of these is public address space?


10.0.0.0/8

172.16.0.0/12

192.168.0.0/16

197.16.0.0/12
25. Match each set of characteristics to the corresponding 802.11 standard
To answers, drag the appropriate set of characteristics from the column on the left to its 802.11 standard
on the right. Each used once, more than once, or not all. Each correct match is worth one point

Frequency range: 802.11a


2.4 – 2.485 GHz 802.11b
Data rate: 11 Mbps

Frequency range: 802.11b


2.4 – 2.485 GHz 802.11g
Data rate: 54 Mbps

Frequency range: 802.11g


2.4 – 2.485 GHz or 5.1 – 5.8 GHz 802.11n
Data rate: 65 - 600 Mbps

Frequency range: 802.11n


5.1 – 5.8 GHz 802.11a
Data rate: 54 Mbps

26. This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, WEP handles the SSL certificate.

Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined to makes the statement correct

802.1X

WPA2-PSK

WPA-PSK

No change is needed

27. Match the VPN connection type to the corresponding definition


To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each
term may be used once, more than once, or not at all. Each correct match is worth one point.

Point-to-Point Protocol SSL VPN Allow a remote user to connect to a private


network from anywhere on the Internet
SSL VPN
site-to-site VPN Securely connects two portions of private
Layer 2 Tunneling
network or two private networks
Protocol
Site-to-Site VPN
layer 2 Tunneling Creates an unencrypted connection between
two network devices
28. What are three characteristics of Ethernet network topology? (Choose three)
It comprises the largest share of the networks in place today

It can use coaxial, twisted pair and fiber optic media

It is a non-switching protocol

It can negotiate different transmission speeds

It uses tokens to avoid collisions on the network

29. An action center alert recommends that you enable windows firewall. After enabling the
firewall, you can lo longer access websites.
Which two TCP ports should you add exceptions for on the firewall? (Choose two)

Port 21

Port 23

Port 25

Port 80

Port 443

You might also like